Ready to download this white paper?

First Name
Last Name
Job Title
Phone Number
You may receive a request for your feedback from OpenSystems Media. Read our new Privacy Policy to understand what data we collect, why we collect it, and what we do with it.
Email Opt-in
Your download is ready!
Error - something went wrong!

IoT Security (Finally) Delivers ROI

November 12, 2018 Brandon Lewis

To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable features such as remote device authentication and secure boot. Even better, licensing entitlement management (LEM) features can transform security from a BOM item to a revenue generator.

In this article, IoT device OEMs will learn:

  • About the benefits of hardware security modules
  • How Trusted Platform Modules (TPMs) enable advanced security features
  • How LEM functions enable ROI from security

About the Author

Brandon Lewis

Brandon Lewis, Editor-in-Chief of Embedded Computing Design, is responsible for guiding the property's content strategy, editorial direction, and engineering community engagement, which includes IoT Design, Automotive Embedded Systems, the Power Page, Industrial AI & Machine Learning, and other publications. As an experienced technical journalist, editor, and reporter with an aptitude for identifying key technologies, products, and market trends in the embedded technology sector, he enjoys covering topics that range from development kits and tools to cyber security and technology business models. Brandon received a BA in English Literature from Arizona State University, where he graduated cum laude. He can be reached by email at brandon.lewis@opensysmedia.com.

Follow on Twitter Follow on Linkedin Visit Website More Content by Brandon Lewis
Previous White Paper
"Zero Touch" IoT Security Is Key to Continued Growth
"Zero Touch" IoT Security Is Key to Continued Growth

By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The probl...

Next White Paper
Securing the IIoT with Flexible Firewalls
Securing the IIoT with Flexible Firewalls

Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial...